1234   1  /  4  页   跳转

紧急求助,如何杀病毒(W32.toxbot)

紧急求助,如何杀病毒(W32.toxbot)

今天去服务器上杀毒,发现了这个病毒 , 名字是W32.toxbot . 杀不去,病毒也无法访问.请高人指教.
最后编辑2006-11-20 18:10:34
分享到:
gototop
 

求助
gototop
 

求助
gototop
 

W32.Toxbot
2005年 03月12日
W32.Toxbot is a worm that opens an IRC back door on the compromised computer and spreads by exploiting vulnerabilities


When W32.Toxbot is executed, it performs the following actions:


Creates a copy of itself as %System%\[random file name].exe.

Note: %System% is a variable that refers to the System folder. By default this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

Where [random file name] is usually 8 characters long. Possible examples of [random file name] include:


TrkWksrv.exe
dxdllsvc.exe
ciclient.exe


Adds the value:

"(Default)" = "Service"

to the registry subkeys:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\Minimal\[random file name]
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\Network\[random file name]

so that it is executed every time Windows starts.


Adds the registry subkeys:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[random file name]
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[random file name]


Installs a back door allowing a remote attacker to have unauthorized access to the compromised computer via IRC channels. The back door allows the remote attacker to perform the following actions:


Log keystrokes
End processes
Steal cached passwords
Steal system information
Download remote files


Spreads by exploiting the following vulnerabilities:


The Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-026).
The Microsoft Windows ntdll.dll Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS03-007).
The Microsoft SQL Server Web Task Stored Procedure Privilege Escalation Vulnerability (as described in Microsoft Security Bulletin MS02-061).


Checks for the presence of the virtual infrastructure software VMware by searching for the registry subkey HKEY_LOCAL_MACHINE\Software\VMware. The worm will not run on computers running this software.

Creates a copy of itself as %System%\[random file name].exe.

Note: %System% is a variable that refers to the System folder. By default this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

Where [random file name] is usually 8 characters long. Possible examples of [random file name] include:


TrkWksrv.exe
dxdllsvc.exe
ciclient.exe


Adds the value:

"(Default)" = "Service"

to the registry subkeys:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\Minimal\[random file name]
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SafeBoot\Network\[random file name]

so that it is executed every time Windows starts.


Adds the registry subkeys:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_[random file name]
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\[random file name]


Installs a back door allowing a remote attacker to have unauthorized access to the compromised computer via IRC channels. The back door allows the remote attacker to perform the following actions:


Log keystrokes
End processes
Steal cached passwords
Steal system information
Download remote files


Spreads by exploiting the following vulnerabilities:


The Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-026).
The Microsoft Windows ntdll.dll Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS03-007).
The Microsoft SQL Server Web Task Stored Procedure Privilege Escalation Vulnerability (as described in Microsoft Security Bulletin MS02-061).


Checks for the presence of the virtual infrastructure software VMware by searching for the registry subkey HKEY_LOCAL_MACHINE\Software\VMware. The worm will not run on computers running this software.

gototop
 

谢谢高人指点  , 可是我看不明白那些拼音是什么意识。

能告诉我怎么杀不?
gototop
 

英文的看不太懂
gototop
 

求助高人 !
gototop
 

用什么杀度软件可以杀掉
gototop
 

The Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-026).
The Microsoft Windows ntdll.dll Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS03-007).
The Microsoft SQL Server Web Task Stored Procedure Privilege Escalation Vulnerability (as described in Microsoft Security Bulletin MS02-061).
叫你到这些地方升级,打补丁
gototop
 

补丁都打了
gototop
 
1234   1  /  4  页   跳转
页面顶部
Powered by Discuz!NT